Amina Allison
1. What is a “brute force” attack?
Answer: b) Trying many password combinations until finding the correct one Explanation: Brute force attacks involve repeatedly guessing passwords, often with automated tools, to gain access.
2. Which of the following is NOT a secure practice when browsing the internet?
Answer: c) Entering sensitive information on public Wi-Fi Explanation: Public Wi-Fi is often insecure, making it easier for attackers to intercept data. Avoid entering sensitive information on these networks.
3. What should you do if your social media account is hacked?
Answer: b) Change your password and check for unauthorized access Explanation: Resetting passwords and monitoring access are essential steps to secure a hacked account and prevent further misuse.
4. What’s a secure way to dispose of an old device?
Answer: b) Perform a factory reset and, if possible, use a data-wiping tool Explanation: A factory reset combined with a data-wiping tool ensures that sensitive information cannot be recovered.
5. What is a “zero-day” vulnerability?
Answer: b) A security flaw that attackers exploit before the developer has a patch Explanation: Zero-day vulnerabilities are dangerous because they’re exploited before they can be patched.
6. What can a VPN (Virtual Private Network) do for your online privacy?
Answer: b) Protect your IP address and encrypt your internet traffic Explanation: VPNs add a layer of privacy by encrypting your traffic and hiding your IP, making it harder to track your activities.
7. What is “ransomware”?
Answer: b) Malicious software that locks data and demands payment for access Explanation: Ransomware encrypts or locks your files, demanding a ransom to unlock them, often targeting personal and corporate data.
8. Why should you cover your webcam when it’s not in use?
Answer: b) To protect against hackers remotely accessing your camera Explanation: Hackers can access webcams, so covering yours when not in use helps protect your privacy.
9. What’s the safest way to handle an attachment from an unknown email sender?
Answer: c) Scan it with antivirus software before opening Explanation: Scanning attachments first helps identify and avoid malware that could harm your device or steal data.
10. If a friend’s social media account sends you a suspicious link, what should you do?
Answer: c) Contact your friend directly to see if they actually sent it Explanation: Hackers often use compromised accounts to send phishing links, so it’s wise to verify with your friend.